Extended version-to be, or not to be stateful: post-quantum secure boot using hash-based signatures

被引:0
|
作者
Wagner, Alexander [1 ,2 ]
Oberhansl, Felix [1 ]
Schink, Marc [1 ,2 ]
机构
[1] Garching near Munich, Fraunhofer AISEC, Munich, Germany
[2] Tech Univ Munich, Munich, Germany
关键词
Post-quantum cryptography; Hash-based signatures; LMS; XMSS; SPHINCS+; Secure boot; Hardware/software co-design;
D O I
10.1007/s13389-024-00362-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While research in PQC has gained significant momentum, its adoption in real-world products is slow. This is largely due to concerns about practicability and maturity. The secure boot process of embedded devices is one scenario where such restraints can result in fundamental security problems. In this work, we present a flexible hardware/software co-design for HBS schemes which enables the transition to a post-quantum secure boot today. These signature schemes stand out due to their straightforward security proofs and are on the fast track to standardisation. Unlike previous work, we exploit the performance intensive similarities of the stateful LMS and XMSS schemes as well as the stateless SPHINCS+ scheme. Thus, we enable designers to use a stateful or stateless scheme depending on the constraints of each individual application. To demonstrate the feasibility of our approach, we compare our results with hardware accelerated implementations of classical asymmetric algorithms. Further, we outline the use of different HBS schemes during the boot process. We compare different schemes, show the importance of parameter choices, and demonstrate the performance gain with different levels of hardware acceleration.
引用
收藏
页码:631 / 648
页数:18
相关论文
共 50 条
  • [21] Secure Hash-Based Password Authentication Protocol Using Smartcards
    Jung, Hyunhee
    Kim, Hyun Sung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
  • [22] Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model
    Xie, Dong
    Peng, HaiPeng
    Li, Lixiang
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (05): : 2427 - 2445
  • [23] eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    COMPUTER JOURNAL, 2024, 67 (04): : 1405 - 1424
  • [24] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99
  • [25] A secure searchable encryption scheme for cloud using hash-based indexing
    Andola, Nitish
    Prakash, Sourabh
    Yadav, Vijay Kumar
    Raghav
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2022, 126 : 119 - 137
  • [26] A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
    Gao, Yu-Long
    Chen, Xiu-Bo
    Chen, Yu-Ling
    Sun, Ying
    Niu, Xin-Xin
    Yang, Yi-Xian
    IEEE ACCESS, 2018, 6 : 27205 - 27213
  • [27] CRYSTALS-Dilithium on RISC-V Processor: Lightweight Secure Boot using Post-Quantum Digital Signature
    Gupta, Naina
    Jati, Arpan
    Chattopadhyay, Anupam
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [28] Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
    Eaton, Edward
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 263 - 280
  • [29] Post-quantum secure compact deterministic wallets from isogeny-based signatures with rerandomized keys
    Shaw, Surbhi
    Dutta, Ratna
    THEORETICAL COMPUTER SCIENCE, 2025, 1035
  • [30] Code-Based Schemes for Post-Quantum Digital Signatures
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Pushkar'ov, Andriy
    Mialkovskyi, Danylo
    Smirnov, Oleksii
    Kuznetsova, Tetiana
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 707 - 712